Dissertations / Theses on the topic 'Biometric data'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Biometric data.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
McNulty, Peggy Sue. "Values issues in biometric data collection." Connect to Electronic Thesis (CONTENTdm), 2009. http://worldcat.org/oclc/525070842/viewonline.
Full textUgail, Hassan, and Eyad Elyan. "Efficient 3D data representation for biometric applications." IOS Press, 2007. http://hdl.handle.net/10454/2683.
Full textAn important issue in many of today's biometric applications is the development of efficient and accurate techniques for representing related 3D data. Such data is often available through the process of digitization of complex geometric objects which are of importance to biometric applications. For example, in the area of 3D face recognition a digital point cloud of data corresponding to a given face is usually provided by a 3D digital scanner. For efficient data storage and for identification/authentication in a timely fashion such data requires to be represented using a few parameters or variables which are meaningful. Here we show how mathematical techniques based on Partial Differential Equations (PDEs) can be utilized to represent complex 3D data where the data can be parameterized in an efficient way. For example, in the case of a 3D face we show how it can be represented using PDEs whereby a handful of key facial parameters can be identified for efficient storage and verification.
Lam, Lawrence G. "Digital Health-Data platforms : biometric data aggregation and their potential impact to centralize Digital Health-Data." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/106235.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (page 81).
Digital Health-Data is being collected at unprecedented rates today as biometric micro sensors continue to diffuse into our lives in the form of smart devices, wearables, and even clothing. From this data, we hope to learn more about preventative health so that we can spend less money on the doctor. To help users aggregate this perpetual growth of biometric "big" data, Apple HealthKit, Google Fit, and Samsung SAMI were each created with the hope of becoming the dominant design platform for Digital Health-Data. The research for this paper consists of citings from technology strategy literature and relevant journalism articles regarding recent and past developments that pertain to the wearables market and the digitization movement of electronic health records (EHR) and protected health information (PHI) along with their rules and regulations. The culmination of these citations will contribute to my hypothesis where the analysis will attempt to support my recommendations for Apple, Google, and Samsung. The ending chapters will encompass discussions around network effects and costs associated with multi-homing user data across multiple platforms and finally ending with my conclusion based on my hypothesis.
by Lawrence G. Lam.
S.M. in Engineering and Management
Stevenson, Brady Roos. "Analysis of Near-Infrared Phase Effects on Biometric Iris Data." BYU ScholarsArchive, 2006. https://scholarsarchive.byu.edu/etd/1299.
Full textKhanna, Tania. "Low power data acquisition for microImplant biometric monitoring of tremors." Thesis, Massachusetts Institute of Technology, 2012. http://hdl.handle.net/1721.1/78448.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 97-100).
In recent years, trends in the medical industry have created a growing demand for implantable medical devices. In particular, the need to provide doctors a means to continuously monitor biometrics over long time scales with increased precision is paramount to efficient healthcare. To make medical implants more attractive, there is a need to reduce their size and power consumption. Small medical implants would allow for less invasive procedures, greater comfort for patients, and increased patient compliance. Reductions in power consumption translate to longer battery life. The two primary limitations to the size of small medical implants are the batteries that provide energy to circuit and sensor components and the antennas that enable wireless communication to terminals outside of the body. The theory is applied in the context of the long term monitoring of Parkinson's tremors. This work investigates how to reduce the amount of data needing to acquire a signal by applying compressive sampling thereby alleviating the demand on the energy source. A low energy SAR ADC is designed using adiabatic charging to further reduce energy usage. This application is ideal for adiabatic techniques because of the low frequency of operation and the ease with which we can reclaim energy from discharging the capacitors. Keywords: SAR ADC, adiabatic, compressive sampling, biometric, implants
by Tania Khanna.
Ph.D.
Mai, Guangcan. "Biometric system security and privacy: data reconstruction and template protection." HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/544.
Full textPisani, Paulo Henrique. "Biometrics in a data stream context." Universidade de São Paulo, 2017. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-08052017-141153/.
Full textA crescente presença da Internet nas tarefas do dia a dia, juntamente com a evolução dos sistemas computacionais, contribuiu para aumentar a exposição dos dados. Esse cenário evidencia a necessidade de sistemas de autenticação de usuários mais seguros. Uma alternativa para lidar com isso é pelo uso de sistemas biométricos. Contudo, características biométricas podem mudar com o tempo, o que pode afetar o desempenho de reconhecimento devido a uma referência biométrica desatualizada. Esse efeito pode ser chamado de template ageing na área de sistemas biométricos adaptativos ou de mudança de conceito em aprendizado de máquina. Isso levanta a necessidade de adaptar automaticamente a referência biométrica com o tempo, uma tarefa executada por sistemas biométricos adaptativos. Esta tese estudou sistemas biométricos adaptativos considerando biometria em um contexto de fluxo de dados. Neste contexto, o teste é executado em um fluxo de dados biométrico, em que as amostras de consulta são apresentadas uma após a outra para o sistema biométrico. Um sistema biométrico adaptativo deve então classificar cada consulta e adaptar a referência biométrica. A decisão de executar a adaptação é tomada pelo sistema biométrico. Dentre as modalidades biométricas, esta tese foca em biometria comportamental, em particular em dinâmica da digitação e em biometria por acelerômetro. Modalidades comportamentais tendem a ser sujeitas a mudanças mais rápidas do que modalidades físicas. Entretanto, havia poucos estudos lidando com sistemas biométricos adaptativos para modalidades comportamentais, destacando uma lacuna para ser explorada. Ao longo da tese, diversos aspectos para aprimorar o projeto de sistemas biométricos adaptativos para modalidades comportamentais em um contexto de fluxo de dados foram discutidos: proposta de estratégias de adaptação para o algoritmo de classificação imunológico Self-Detector, combinação de modelos genuíno e impostor no framework do Enhanced Template Update e aplicação de normalização de scores em sistemas biométricos adaptativos. Com base na investigação desses aspectos, foi observado que a melhor escolha para cada aspecto estudado dos sistemas biométricos adaptativos pode ser diferente dependendo do conjunto de dados e, além disso, dependendo dos usuários no conjunto de dados. As diferentes características dos usuários, incluindo a forma como as características biométricas mudam com o tempo, sugerem que as estratégias de adaptação deveriam ser escolhidas por usuário. Isso motivou a proposta de um sistema biométrico adaptativo modular, chamado ModBioS, que pode escolher cada um desses aspectos por usuário. O ModBioS é capaz de generalizar diversos sistemas baseline e propostas apresentadas nesta tese em um framework modular, juntamente com a possibilidade de atribuir estratégias de adaptação diferentes por usuário. Resultados experimentais mostraram que o sistema biométrico adaptativo modular pode superar diversos sistemas baseline, enquanto que abre um grande número de oportunidades para trabalhos futuros.
Pratt, Jamie M. "The Effects of Worksite Health Promotion Programs on Employee Biometric Data." BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/5752.
Full textAronsson, Erik. "Biometric Authentication and Penetration of Smartphones." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37713.
Full textSinsel, Adam R. "Supporting the maritime information dominance: optimizing tactical network for biometric data sharing in maritime interdiction operations." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45257.
Full textThis research intends to improve information dominance in the maritime domain by optimizing tactical mobile ad hoc network (MANET) systems for wireless sharing of biometric data in maritime interdiction operations (MIO). Current methods for sharing biometric data in MIO are unnecessarily slow and do not leverage wireless networks at the tactical edge to maximize information dominance. Field experiments allow students to test wireless MANETs at the tactical edge. Analysis is focused on determining optimal MANET design and implementation. It considers various implementations with varied antenna selection, radio power, and frequency specifications, and two specific methods of integrating Department of Defense biometric collection devices to the wireless MANET, which utilizes a single (WR) MPU4 802.11 Wi-Fi access point to connect secure electronic enrollment kit II (SEEK II) biometric devices to the MANET, and tethers each SEEK device to a dedicated WR using a personal Ethernet connection. Biometric data is shared across the tactical network and transmitted to remote servers. Observations and analysis regarding network performance demonstrate that wireless MANETs can be optimized for biometric reach back and integrated with biometric devices to improve biometric data sharing in MIO.
Blommé, Johan. "Evaluation of biometric security systems against artificial fingers." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1145.
Full textVerification of users’ identities are normally carried out via PIN-codes or ID- cards. Biometric identification, identification of unique body features, offers an alternative solution to these methods.
Fingerprint scanning is the most common biometric identification method used today. It uses a simple and quick method of identification and has therefore been favored instead of other biometric identification methods such as retina scan or signature verification.
In this report biometric security systems have been evaluated based on fingerprint scanners. The evaluation method focuses on copies of real fingers, artificial fingers, as intrusion method but it also mentions currently used algorithms for identification and strengths and weaknesses in hardware solutions used.
The artificial fingers used in the evaluation were made of gelatin, as it resembles the surface of human skin in ways of moisture, electric resistance and texture. Artificial fingers were based on ten subjects whose real fingers and artificial counterpart were tested on three different fingerprint scanners. All scanners tested accepted artificial fingers as substitutes for real fingers. Results varied between users and scanners but the artificial fingers were accepted between about one forth and half of the times.
Techniques used in image enhancement, minutiae analysis and pattern matching are analyzed. Normalization, binarization, quality markup and low pass filtering are described within image enhancement. In minutiae analysis connectivity numbers, point identification and skeletonization (thinning algorithms) are analyzed. Within pattern matching, direction field analysis and principal component analysis are described. Finally combinations of both minutiae analysis and pattern matching, hybrid models, are mentioned.
Based on experiments made and analysis of used techniques a recommendation for future use and development of fingerprint scanners is made.
Brobeck, Stefan, and Tobias Folkman. "Biometrics : Attitudes and factors influencing a breakthrough in Sweden." Thesis, Jönköping University, JIBS, Business Informatics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-148.
Full textBiometrics is a collection of methods for identifying and authorizing individuals with something they are, or do. It is considered to be one of the most secure technologies for security, both physical and logical. Security is something very important for organizations today, but yet there has been a low interest in investing in biometrics for security in Sweden.
The purpose of this thesis has been to establish factors to why biometrics has not been implementedto any large extent, even though the technology has been around for long. We have evaluated the attitudes and views of individuals, as well as company leaders. Problem and questions with biometrics that often are discussed are privacy concerns, costs and ROI (return on investment) and user acceptance. Foremost there is a concern about the costs of implementing such a solution, although some claim that money can be saved by avoiding the costs in more traditional security methods, such as password administration and in security cards.
There is a range of different technologies to use, such as facial-scan, voice-scan and the most mature and well known technique, finger-scan which has been around for a long time, especially for identifying criminals. All these techniques have there positive and negative sides, often measured in different levels of universality, uniqueness, permanence and collectability, e.g. eye-scan has a high uniqueness, facial-scan has a high universability and signature-scan has a low permanence level.
We have collected our data through interviews with companies and suppliers of biometric systems as well as a questionnaire given to private persons. By interpreting the data in a qualitative way we have made our analysis and reached a conclusion.
Our result shows that a cost related to biometric solutions is the largest reason why investments have been absent. This verifies the results of other authors, that the cost is the largest obstacle. Another important factor is that companies believe that biometrics is for organizations with a very high security need. Further our result show that individuals are positive towards biometrics.
Biometri är ett samlingsnamn för tekniker som identifierar och auktoriserar individer, antingen något de är eller gör. Biometri anses vara en av de säkraste teknologierna för säkerhet, både fysisk och logisk. Säkerhet är något som är mycket viktigt för organisationer i dagens läge, men än så länge så har investeringar i biometriska säkerhetslösningar i Sverige uteblivit. Syftet med denna magisteruppsats har varit att fastställa faktorer som bidrar till att biometriska lösningar inte har blivit implementerade i någon större utsträckning, trots att teknologin har funnits länge. Vi har utvärderat individers samt företagsledares attityder och synsätt angående biometri.
Frågor och problem som ofta relateras till biometri är personligintegritet, kostnader och avkastning på investering samt användaracceptans. Framförallt är det osäkerheten kring kostnaderna av en implementering av en biometrisklösning. Det finns även de som hävdar att biometriska lösningar kan spara pengar jämfört med traditionella system därför att man undviker till exempel lösenordsadministration och passerkort.
Det finns en rad olika tekniker att använda, exempelvis ansiktsavläsning, röstigenkänning och den mest mogna och kända tekniken, fingeravtrycksläsning som har existerat en längre tid, framförallt för att identifiera kriminella. Det finns positiva och negativa sidor med alla dessa tekniker, de mäts oftast i olika nivåer av hur många som kan använda det, hur unikt biometrin är, beständighet och hur biometrin samlas in.
Genom intervjuer med företag och leverantörer av biometriska lösningar samt en utdelad enkät till privat personer har vi samlat in data. Vi har sedan tolkat data kvalitativt och utfört vår analys och slutligen kommit fram till ett resultat.
Vårt resultat har visat att kostnader relaterade till biometriska system är det största skälet till varför investeringar har uteblivit. Detta bekräftar vad många andra författare tidigare har funnit, att kostnaderna är det största hindret. En annan viktig faktor är att företag anser att biometri är något för verksamheter som kräver den allra högsta säkerheten. Vidare har individer en positiv inställning till biometri.
Giesing, Ilse. "User perception related to identification through biometrics within electronic business." Pretoria : [s.n.], 2003. http://upetd.up.ac.za/thesis/available/etd-01092004-141637.
Full textJašková, Jitka. "Zpracování osobních údajů v rámci EU se zřetelem na policejní a justiční spolupráci." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-18247.
Full textLi, Jiawei. "Person re-identification with limited labeled training data." HKBU Institutional Repository, 2018. https://repository.hkbu.edu.hk/etd_oa/541.
Full textAra?jo, Rayron Victor Medeiros de. "A probabilistic analysis of the biometrics menagerie existence: case study in fingerprint data." Universidade Federal do Rio Grande do Norte, 2016. http://repositorio.ufrn.br/handle/123456789/21032.
Full textApproved for entry into archive by Arlan Eloi Leite Silva (eloihistoriador@yahoo.com.br) on 2016-07-27T00:08:32Z (GMT) No. of bitstreams: 1 RayronVictorMedeirosDeAraujo_DISSERT.pdf: 4039405 bytes, checksum: 1fdfbf6dd2e57fcc334017f7a3ee24ab (MD5)
Made available in DSpace on 2016-07-27T00:08:32Z (GMT). No. of bitstreams: 1 RayronVictorMedeirosDeAraujo_DISSERT.pdf: 4039405 bytes, checksum: 1fdfbf6dd2e57fcc334017f7a3ee24ab (MD5) Previous issue date: 2016-02-18
At? pouco tempo atr?s o uso de biometria se restringia a ambientes de alta seguran?a e aplica??es de identifica??o criminal por raz?es de natureza econ?mica e tecnol?gica. Contudo, nos ?ltimos anos a autentica??o biom?trica come?ou a fazer parte do dia a dia das pessoas. Desde ent?o, alguns problemas de autentica??o entraram em evid?ncia, como a impossibilidade de votar numa elei??o porque o indiv?duo n?o tinha sua impress?o digital reconhecida. Isso acontece, pois os usu?rios de um sistema biom?trico podem ter diferentes graus de acur?cia, principalmente em sistemas de utiliza??o em larga escala. Alguns desses usu?rios podem ter dificuldade na autentica??o, enquanto outros podem ser, particularmente, vulner?veis ? imita??o. Estudos recentes investigaram e identificaram esses tipos de usu?rios, dando-lhes nomes de animais: Sheep, Goats, Lambs, Wolves, Doves, Chameleons, Worms e Phantoms. O objetivo desse trabalho ? avaliar a exist?ncia desses tipos de usu?rios em uma base de dados de impress?es digitais e propor uma nova forma de investig?-los, baseando-se no desempenho das verifica??es entre amostras. Nossos resultados identificaram a presen?a de goats, lambs, wolves, chameleons e phantoms, al?m de demonstrar a aus?ncia de worms e doves, em um sistema biom?trico proposto.
Until recently the use of biometrics was restricted to high-security environments and criminal identification applications, for economic and technological reasons. However, in recent years, biometric authentication has become part of daily lives of people. The large scale use of biometrics has shown that users within the system may have different degrees of accuracy. Some people may have trouble authenticating, while others may be particularly vulnerable to imitation. Recent studies have investigated and identified these types of users, giving them the names of animals: Sheep, Goats, Lambs, Wolves, Doves, Chameleons, Worms and Phantoms. The aim of this study is to evaluate the existence of these users types in a database of fingerprints and propose a new way of investigating them, based on the performance of verification between subjects samples. Once introduced some basic concepts in biometrics and fingerprint, we present the biometric menagerie and how to evaluate them.
Giersberg, Mona Franziska [Verfasser]. "Collection of biometric data as an animal based approach for the assessment of minimum space requirements in livestock farming / Mona Franziska Giersberg." Hannover : Bibliothek der Tierärztlichen Hochschule Hannover, 2017. http://d-nb.info/1136159762/34.
Full textBanerjea-Brodeur, Nicolas Paul. "Advance passenger information passenger name record : privacy rights and security awareness." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=80909.
Full textPassenger Name Record access permits authorities to have additional data that could identify individuals requiring more questioning prior to border control clearance. This data does not cause in itself privacy issues other than perhaps the potential retention and manipulation of information that Border Control Authorities may acquire. In essence, bilateral agreements between governments should be sought in order to protect national legislation.
The common goal of the airline industry is to ensure safe and efficient air transport. API and PNR should be viewed as formalities that can facilitate border control clearance and prevent the entrance of potentially high-risk individuals.
Giesa, Anette Isabella. "Play for the Black Box — Using Critical Play to raise awareness of data privacy issues." Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-23959.
Full textCosta, Leandro Garcia da. "Crescimento, desenvolvimento e consumo hídrico de cana-de-açúcar sob dois sistemas de manejo da palha." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/11/11152/tde-23012017-150113/.
Full textDetermining the optimal amount of trash blankets above ground is one of the most discussed issues by the sugarcane industry, since this residue can be considered a byproduct of sugarcane due to cellulosic ethanol and electricity cogeneration. To establish these values, it is necessary to consider the crop needs together with physical, chemical and biological soil characteristics. The process based crop models (PBCMs), specifically APSIM-Sugar, able to simulate the soil organic matter, can be used in conjunction with field experiments to support the decision making about the optimum amounts of trash blanket for Brazilian sugarcane farming systems. PBCMs might be used to simulate the crop development and growth, water, nitrogen and carbon soil balances, and make the experiment data applicable for other regions allowing for a broader view and understanding on the key questions. In this context, this study compared two treatments: maintenance of 100% of the trash (CP) and removal of 100% of the trash (SP) in an experiment carried out with an irrigated first ratoon of RB867515 cultivar in Southern Brazil, at city of Piracicaba, State of São Paulo, Lat. 22,67° S and Long. 47,64° W. Monthly biometric evaluations were performed regarding the variables, tillering, stalk\'s height and diameter, leaf area index (LAI) and number of green leaves, as well as fresh and dry mass of leaves, cabbages and stalks. Crop evapotranspiration (ETc) were assessed by Bowen ratio method (MRB) and frequency domain reflectometry (FDR). Sap flow measured by heat balance method was assumed to be the crop transpiration (Tp). APSIM-Sugar crop model was calibrated based on these experimental data, and such model was applied for different Brazilian regions for evaluating the best water-trash management strategies for each region. Comparing both treatments there were just significant differences for leaf area index (LAI) and leaves dry mass (MSF). ETc was ranged from 3 to 8 mm day-1, depending on the weather conditions and crop stage. Crop coefficient (Kc) showed an inverse linear relationship with reference evapotranspiration (ETo), in such way that when ETo < 2 mm, the Kc(SP) = 1,8 and Kc(CP) = 1,5, and for ETo > 6mm it was observed Kc(CP) = 1,3 and Kc(SP) = 1,2. APSIM-Sugar simulations showed that, in the most part of cases, the keeping at least 50% of trash blanket and 25% of total irrigation requirement, resulted on the highest yield rates.
Gustavsson, Linnéa. "Ansiktsrekonstruktion : Mannen från den medeltida kyrkoruinen S:t Hans, Visby." Thesis, Uppsala universitet, Arkeologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-386062.
Full textДмитерко, Василь Миколайович, and Vasyl Dmyterko. "дослідження систем підтримки прийняття рішень в біометричних системах аутентифікації." Thesis, Тернопільський національний технічний університет імені Івана Пулюя, 2017. http://elartu.tntu.edu.ua/handle/123456789/19006.
Full textThe improvement is in the development of an allocation method for biometric parameters that are based on the face control points. It was also reviewed some basic principles and methods of biometric authentication and identification, biometric methods of human authentication by facial features, and it was provided the information about the existing identification systems and face authentication software. The digital photo samples of a person were studied and the biometric features selection method was developed based on those samples.
Koppikar, Samir Dilip. "Privacy Preserving EEG-based Authentication Using Perceptual Hashing." Thesis, University of North Texas, 2016. https://digital.library.unt.edu/ark:/67531/metadc955127/.
Full textLodrová, Dana. "Bezpečnost biometrických systémů." Doctoral thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-261226.
Full textMadsen, Angelica, and Carl Nymanson. "Bör du v(AR)a rädd för framtiden? : En studie om The Privacy Paradox och potentiella integritetsrisker med Augmented Reality." Thesis, Malmö universitet, Malmö högskola, Institutionen för datavetenskap och medieteknik (DVMT), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-43868.
Full textIn a time when digitalization is more widespread than ever, the amount of data collected and shared is increasing. As new technologies develop, challenges for privacy concerns arises. An active online user is likely to engage in one or many social media platforms, where the purpose often involves sharing information with others. Since Augmented Reality is more frequently supported in some of the biggest social media applications, the purpose of this study was to investigate potential privacy concerns with Augmented Reality. The study’s approach consisted of an empirical data collection to create a theoretical framework for the study. Based on this, a digital survey and interviews were conducted to further investigate the user's behavior online and The Privacy Paradox. Based on the results of the survey, The Privacy Paradox could be confirmed and a better understanding of how the user interacts through digital channels was achieved. The study treats different aspects of privacy concerns such as user terms, privacy policies, data brokers, future consequences and what technology enables. The study reached the conclusion that users, businesses and today's technology allow a more sensitive type of information to be collected through a data breach. Even if there has not yet occurred a data breach enabled by Augmented Reality prior to this study, there is a risk that it is only a matter of time until this happens.
Nishibe, Caio Arce. "Central de confrontos para um sistema automático de identificação biométrica: uma abordagem de implementação escalável." Universidade Tecnológica Federal do Paraná, 2017. http://repositorio.utfpr.edu.br/jspui/handle/1/3142.
Full textWith the popularization of biometrics, personal identification is an increasingly common activity in several contexts: physical and logical access control, border control, criminal and forensic identification, payments. Thus, there is a growing demand for faster and accurate Automatic Biometric Identification Systems (ABIS) capable to handle a large volume of biometric data. This work presents an approach to implement a scalable cluster-based matching platform for a large-scale ABIS using an in-memory computing framework. We have conducted some experiments that involved a database with more than 50 million captured fingerprints, in a cluster up to 16 nodes. The results have shown the scalability of the proposed solution and the capability to handle a large biometric database.
TELES, Heria de Freitas. "Caracterização de ambientes com ocorrência natural Acrocomia aculeata (Jacq.) Lodd. ex Mart e suas populações nas regiões Centro e Sul do Estado de Goiás." Universidade Federal de Goiás, 2009. http://repositorio.bc.ufg.br/tede/handle/tde/2642.
Full textIn the Cerrado, some species of palm trees stand out from the natural, economic, and ecological point of view, either by the predominance, either by exuberance of the plant or importance in the wild fauna and/or flora equilibrium, or even by use of their products and byproducts by the local community. Among these, the macauba (Acrocomia aculeata) occurs in abundance in some states, mainly in Goiás. Increasingly this palm has aroused interest, by its high production of fruits and several uses, such as food, forage, ornamental and oilseed production. And, furthermore, its fruits are highly prized for human consumption, domestic and wild fauna. However, the existing exploitation is basically extractivist and with low productivity. The installation of commercial fields lives together with a series of difficulties, including the lack of knowledge of its ecological requirements. This research aimed to characterize environments of naturally occurring macauba and their respective populations, in the regions Center and South of the State of Goias. Ten areas were studied, located in seven municipalities: Santa Cruz de Goiás, São Miguel do Passa Quatro, São Francisco de Goiás, Parauna, Jandaia, Indiara and Jaraguá. Soil chemical and physical characterizations were carried out, in addition to the description of a brief topossequence description. Climatic data relating to historical series from 1961 to 1990 were obtained, as well as a biometric survey of plants and fruits. According to results, the species occurs in greater density in soils of medium to high fertility. Areas with a predominance of Cambisolos and Neossolos, and with medium texture or sandy clay loam, presented higher plant density. Greater concentration of macauba plants occurs in portions of convex slope, talus and concave slope of topossequences. The macauba develops in soils with base saturation above 50% and high levels of potassium, as evidenced by the presence of muscovite in the areas of occurrence. There is phenotypical variability of the characters studied between plants of macauba of different areas and, in particular, between plants within the area. The population of macauba in the municipality of Jamaica is more productive in terms of number of bunches per plant. Macauba presents both phenologic stages of flowering and fructification, besides bunches of fruit in different stages of development, producing around three to five bunches of fruits per plant in the regions Center and South of the State of Goias. There is no correlation between biometric data of plants and soil fertility variables. Biometric data of fruits have variation between areas, between plants within the area and, mainly, between fruits in trees. The micronutrient iron in the soil is positively correlated with almond average mass and calcium is negatively correlated with number of almonds. The average mass of fruit is positively correlated with across and longitudinal diameters and with the total almond mass. In general, the fruit of macauba presents one to three almonds and is constituted of 23.73% of shell, 33.10% of endocarp, 34.28% of pulp and 8.89% of almond.
No Cerrado, algumas espécies de palmeiras se destacam do ponto de vista natural, econômico e ecológico, seja pela predominância, seja pela exuberância da planta ou importância no equilíbrio da fauna e/ou flora, ou ainda pelo aproveitamento de seus produtos e subprodutos pela comunidade local. Dentre estas, a macaúba (Acrocomia aculeata) ocorre em abundância em alguns Estados, principalmente em Goiás. Cada vez mais esta palmeira tem despertado interesse, pela sua alta produção de frutos e por possuir diversas utilidades, como alimentícias, forrageira, ornamental e oleaginosa. E, ainda, seus frutos são muito apreciados pelo homem, fauna doméstica e silvestre. Porém, a exploração hoje existente é basicamente extrativista e com baixa produtividade. A instalação de lavouras comerciais convive com uma série de dificuldades, incluindo o desconhecimento de suas exigências ecológicas. Este trabalho objetivou caracterizar ambientes de ocorrência natural da macaúba e suas respectivas populações, nas regiões Centro e Sul do Estado de Goiás. Trabalhou-se com dez áreas, locadas em sete municípios: Santa Cruz de Goiás, São Miguel do Passa Quatro, São Francisco de Goiás, Paraúna, Jandaia, Indiara e Jaraguá. Foram realizadas caracterizações química e física do solo; além da descrição da topossequência e sua classificação sucinta. Obteve-se também os dados climáticos relativos à série histórica de 1961 a 1990, além de levantamento de dados biométricos das plantas e frutos. De acordo com os resultados, a espécie ocorre em maior densidade em solos de média a alta fertilidade. Áreas com predomínio de Cambissolos e Neossolos, e com textura média ou franco argilo-arenosa, apresentaram maior densidade de plantas. Ocorre, também, maior concentração de macaubeiras nas porções declive convexo, tálus e declive côncavo da topossequência. A macaúba se desenvolve em solos com saturação de bases acima de 50% e altos níveis de potássio, evidenciado até mesmo pela presença de muscovita nas áreas de ocorrência. Existe variabilidade fenotípica dos caracteres estudados entre plantas de macaúba das diferentes áreas e, especialmente, entre as plantas dentro da área. A população de macaúba da área no município de Jandaia é mais produtiva em termos de número de cachos por planta. A macaúba apresenta simultaneamente as fenofases de floração e frutificação, além de cachos de frutos em diferentes estádios de desenvolvimento, produzindo cerca de três a cinco cachos de frutos por planta nas regiões Centro e Sul do Estado de Goiás. Não há correlação entre os dados biométricos das plantas e as variáveis de fertilidade do solo. Os dados biométricos de frutos possuem variação entre áreas, entre plantas dentro da área e, principalmente, entre frutos no cacho. O micronutriente ferro no solo correlaciona-se positivamente com a massa média de amêndoas e, o cálcio, negativamente com o número de amêndoas. A massa média dos frutos correlaciona-se positivamente com os diâmetros transversal e longitudinal, e com a massa total de amêndoas destes. De forma geral, o fruto de macaúba constitui-se de 23,73% de casca, 33,10% de endocarpo, 34,28% de polpa e 8,89% de amêndoa.
Maime, Ratakane Baptista. "CHALLENGES AND OPPORTUNITIES OF ADOPTING MANAGEMENT INFORMATION SYSTEMS (MIS) FOR PASSPORT PROCESSING: COMPARATIVE STUDY BETWEEN LESOTHO AND SOUTH AFRICA." Thesis, Central University of Technology, Free State. Business Administration, 2014. http://hdl.handle.net/11462/237.
Full textFast and secure public service delivery is not only a necessity, but a compulsory endeavour. However, it is close to impossible to achieve such objectives without the use of Information Technology (IT). It is correspondingly important to find proper sustainability frameworks of technology. Organisations do not only need technology for efficient public service; the constant upgrading of systems and cautious migration to the newest IT developments is also equally indispensable in today’s dynamic technological world. Conversely, countries in Africa are always lagging behind in technological progresses. Such deficiencies have been identified in the passport processing of Lesotho and South Africa, where to unequal extents, problems related to systems of passport production have contributed to delays and have become fertile grounds for corrupt practices. The study seeks to identify the main impediments in the adoption of Management Information Systems (MIS) for passport processing. Furthermore, the study explores the impact MIS might have in attempting to combat long queues and to avoid long waiting periods – from application to issuance of passports to citizens. The reasonable time frame between passport application and issuance, and specific passport management systems, have been extensively discussed along with various strategies that have been adopted by some of the world’s first movers in modern passport management technologies. In all cases and stages of this research, Lesotho and South Africa are compared. The research approach of the study was descriptive and explorative in nature. As a quantitative design, a structured questionnaire was used to solicit responses in Lesotho and South Africa. It was established that both Lesotho and South Africa have somewhat similar problems – although, to a greater extent, Lesotho needs much more urgent attention. Although the processes of South Africa need to be improved, the Republic releases a passport much faster and more efficiently than Lesotho. Economic issues are also revealed by the study as unavoidable factors that always affect technological developments in Africa. The study reveals that the latest MIS for passport processing has facilitated modern, automated border-control systems and resultant e-passports that incorporate more biometric information of citizens to passports – thanks to modern RFID technologies. One can anticipate that this study will provide simple, affordable and secure IT solutions for passport processing. Key words: Information Technology (IT); Management Information Systems (MIS); E-Government; E-Passport; Biometrics; and RFID.
Pinto, Allan da Silva 1984. "A countermeasure method for video-based face spoofing attacks : Detecção de tentativas de ataque com vídeos digitais em sistemas de biometria de face." [s.n.], 2013. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275616.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-23T22:22:57Z (GMT). No. of bitstreams: 1 Pinto_AllandaSilva_M.pdf: 47523880 bytes, checksum: 072eb0490c26631b80cdcc47d55a4817 (MD5) Previous issue date: 2013
Resumo: O resumo poderá ser visualizado no texto completo da tese digital
Abstract: The complete abstract is available with the full electronic document
Mestrado
Ciência da Computação
Mestre em Ciência da Computação
Bekli, Zeid, and William Ouda. "A performance measurement of a Speaker Verification system based on a variance in data collection for Gaussian Mixture Model and Universal Background Model." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20122.
Full textRiera, Sardà Alexandre. "Computational Intelligence Techniques for Electro-Physiological Data Analysis." Doctoral thesis, Universitat de Barcelona, 2012. http://hdl.handle.net/10803/107818.
Full textEste trabajo contiene los esfuerzos que he realizado en los últimos años en el campo del análisis de datos electro-fisiológicos. La mayor parte del trabajo se ha hecho en Starlab Barcelona SL y otra parte en el Laboratorio de Neurodinámica del Departamento de Psiquiatría y Psicobiología Clínica de la Universidad de Barcelona. La parte central de esta tesis está relacionado con el análisis de la señales de electroencefalografía (EEG), aunque otras señales, tales como electrocardiografía (ECG), electroculografía (EOG) y electromiografía (EMG) también se han utilizado. Varios conjuntos de datos se han recogido y analizado aplicando técnicas avanzadas de procesamiento de señales. En una fase posterior, técnicas de inteligencia computacional, tales como 'Machine Learning' y algoritmos genéticos, se han aplicado, principalmente para clasificar las diferentes condiciones de los conjuntos de datos de EEG. Las 3 aplicaciones, que involucran EEG y técnicas de clasificación, que se presentan en esta tesis son: -Análisis de señales electro-fisiológicas para aplicaciones de biometría -Diferencias en las características del EEG en pacientes de primer brote psicótico -Marcadores de estrés en la señal de EEG
Grundtman, Per. "Adaptive Learning." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-61648.
Full textNytorpe, Piledahl Staffan, and Daniel Dahlberg. "Detektering av stress från biometrisk data i realtid." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-31248.
Full text葉英傑 and Ying-Kit David Ip. "Analysis of clustered grouped survival data." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2001. http://hub.hku.hk/bib/B31226127.
Full textIp, Ying-Kit David. "Analysis of clustered grouped survival data /." Hong Kong : University of Hong Kong, 2001. http://sunzi.lib.hku.hk/hkuto/record.jsp?B2353011x.
Full textMaghsoudi, Javid. "A Behavioral Biometrics User Authentication Study Using Motion Data from Android Smartphones." Thesis, Pace University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10690910.
Full textThis is a study of the behavioral biometric of smartphone motion to determine the potential accuracy of authenticating users on smartphone devices. The study used the application Sensor Kinetics Pro and the Weka machine-learning library to analyze accelerometer and gyroscope data. The study conducted three experiments for the research. They were conducted in spring 2015, fall 2015, and spring 2016. The final experiment in spring 2016 used six Android-based smartphones to capture data from 60 participants and each participant performed 20 trials of two motions: bringing the phone up to eye level for review, and then bringing the phone to the ear, resulting in 1200 runs. The resulting sensor datasets were used for machine learning training and testing. The study used filtering data to remove noise, and then aggregated the data and used them as inputs to the Weka Machine Learning tool. The study used several machine classification algorithms: the Multilayer Perception (MLP), k-Nearest Neighbor (k-NN), Naïve Bayes (N-B), and Support Vector Machine (SVM) machine learning classification algorithms. The study reached authentication accuracies of up to 93% thus supporting the use of behavioral motion biometrics for user authentication. Preliminary studies with smaller numbers of participants in spring 2015 and in fall 2015 also produced 90%+ authentication accuracy.
Deutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie. "GMS Medizinische Informatik, Biometrie und Epidemiologie." German Medical Science, 2005. https://ul.qucosa.de/id/qucosa%3A12911.
Full textMcClelland, Robyn L. "Regression based variable clustering for data reduction /." Thesis, Connect to this title online; UW restricted, 2000. http://hdl.handle.net/1773/9611.
Full textSavaluny, Elly. "Analysis of ordered categorical data : partial proportional odds and stratified models." Thesis, University of Reading, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.326978.
Full textStoner, Julie Ann. "Analysis of clustered data : a combined estimating equations approach /." Thesis, Connect to this title online; UW restricted, 2000. http://hdl.handle.net/1773/9594.
Full text梁翠蓮 and Tsui-lin Leung. "Proportional odds model for survival data." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1999. http://hub.hku.hk/bib/B42575011.
Full textLeung, Tsui-lin. "Proportional odds model for survival data." Click to view the E-thesis via HKUTO, 1999. http://sunzi.lib.hku.hk/hkuto/record/B42575011.
Full textLiu, Fei, and 劉飛. "Statistical inference for banding data." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B41508701.
Full textLiu, Fei. "Statistical inference for banding data." Click to view the E-thesis via HKUTO, 2008. http://sunzi.lib.hku.hk/hkuto/record/B41508701.
Full textUlmer. "Biometrie und Informatik in Medizin und Biologie." Fischer, 1991. https://ul.qucosa.de/id/qucosa%3A12649.
Full textDeutsche, Gesellschaft für Medizinische Informatik Biometrie und Epidemiologie (GMDS). "Biometrie und Informatik in Medizin und Biologie." Fischer, 2014. https://ul.qucosa.de/id/qucosa%3A12566.
Full textZhou, Feifei, and 周飞飞. "Cure models for univariate and multivariate survival data." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B45700977.
Full textHartung, Karin. "Biometrical approaches for analysing gene bank evaluation data on barley (Hordeum spec.)." [S.l. : s.n.], 2007. http://nbn-resolving.de/urn:nbn:de:bsz:100-opus-2251.
Full textLee, Yau-wing. "Modelling multivariate survival data using semiparametric models." Click to view the E-thesis via HKUTO, 2000. http://sunzi.lib.hku.hk/hkuto/record/B4257528X.
Full textBaraldi, Carlo. "La sicurezza dei dati biometrici nella firma grafometrica. Aspetti giuridici e tecnologici." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6682/.
Full text